What is Sandmap?

Dolyetyus

International Team Leader
21 Nis 2020
910
80
Leiden
sandmap2.jpg


rNH7hh.png


Sandmap is a tool for network and system discovery scans using the infrastructure of the Nmap engine. It provides ease of use to users because it is added to the interface by automating Nmap scans. Scan results are much faster compared to nmap. Thanks to the nmap commands corresponding to the scanning modules, we can easily remember the nmap commands even if we forget them, and we can perform the scans in a faster and more practical way. Sandmap offers us many different possibilities, one of which is that we can use nmap and zenmap tools while inside the tool. In addition, by installing proxychains, we can explore and scan the tor network with the sandmap tool.



Basic Features

  • Includes predefined and automated scans.
  • Has NMAP Script support.
  • Has TOR scanning support. (Requires proxychains tool's installation.)
  • Can perform different scans at the same time.
  • There are 459 different scanning options for 31 modules.

rNH7hh.png




For Sandmap Installation;




(Nmap and xterm terminal emulator must be installed before installation.)




Kod:
git clone https://github.com/trimstray/sandmap






sandmap1.jpg




Kod:
cd sandmap



Kod:
./setup.sh install



If you see the text below after entering the commands one by one, our tool is ready to use. You can run the tool by typing sandmap into the terminal.




Kod:
Create symbolic link to /usr/local/bin
Create man page to /usr/local/man/man8


sandmap2.jpg




rNH7hh.png




sandmap.jpg




Above is an image of the interface. You can get information about what you can do by typing the Help command, and you can see the available scanning modules by typing list command.



rNH7hh.png




sandmap1.jpg




Here is the screenshot of the result of the list command. We can start using it by adding 'use' to the beginning of the module we want to use. We may start the process by performing a port scan.




Kod:
use port_scan



After this command, we can look at the scan features with the 'show' command.




sandmap2-1.jpg




Here, we see the names of the scanning modules, the IDs of the scanning modules on the left, and the corresponding commands in the nmap parameter on the right. In order to use the module, we first need to target our tool for this process;



Kod:
set dest TARGET IP OR TARGET SERVER NAME






After this process, we start the scanning process by giving the



Kod:
init MODUL ID NUMBER



command, whichever scan we want to do.



sandmap351d68438e4533894.jpg




This is how we simply do the open port scanning processes. All possible scans are done with the same operations, first the target is specified and then scans are made with the init command. By using this tool, we can easily perform all scans without the need to memorize nmap commands.





rNH7hh.png



Translator and Editor: @Dolyetyus
Original: Sandmap Nedir?
 

THT SON MESAJLAR

Üst

Turkhackteam.org internet sitesi 5651 sayılı kanun’un 2. maddesinin 1. fıkrasının m) bendi ile aynı kanunun 5. maddesi kapsamında "Yer Sağlayıcı" konumundadır. İçerikler ön onay olmaksızın tamamen kullanıcılar tarafından oluşturulmaktadır. Turkhackteam.org; Yer sağlayıcı olarak, kullanıcılar tarafından oluşturulan içeriği ya da hukuka aykırı paylaşımı kontrol etmekle ya da araştırmakla yükümlü değildir. Türkhackteam saldırı timleri Türk sitelerine hiçbir zararlı faaliyette bulunmaz. Türkhackteam üyelerinin yaptığı bireysel hack faaliyetlerinden Türkhackteam sorumlu değildir. Sitelerinize Türkhackteam ismi kullanılarak hack faaliyetinde bulunulursa, site-sunucu erişim loglarından bu faaliyeti gerçekleştiren ip adresini tespit edip diğer kanıtlarla birlikte savcılığa suç duyurusunda bulununuz.